Page 49 - Publication6
P. 49




Recent attacks demonstrate the numerous entry points This kind of technology not only mitigates the risk of a data
whereby data breaches occur. One of the most vulnerable breach, but provides valuable audit information when
and therefore common points of attack is through mobile dealing with investigations and regulatory bodies. The

devices that connect to an organization�s network. ability to prove data has not been accessed can potentially
diffuse an otherwise damaging breach situation.
Many opportunities for cyber attack, such as malware, lost
or stolen devices, phishing, disabling of encryption The rapid surge in data breaches has sounded the alarm
technology, begin with human negligence, not necessarily bell for corporate America. As regulatory oversight
security oversight. continues to increase, industries will seek to employ
advanced forms of technology to better protect sensitive
data and to avoid the risk of incurring penalties for not

doing so responsibly.

As regulation evolves, a layered approach to information
security which includes persistence technology on all of a
network�s mobile devices can prove significant in
preventing or limiting the damage of a breach, but also
remaining compliant under constantly evolving legislation.


About the Author

As Legal Counsel at Absolute Software, Stephen Treglia
provides oversight and guidance on regulatory compliance

related to data breaches and other security incidents.
Stephen counsels the Absolute Investigations team who
conduct data forensics, theft investigations, and device
recoveries. Stephen has extensive knowledge of the US
regulatory landscape, including SOX, HIPAA, and other
No matter what an organization�s industry, persistence industry-specific regulatory bodies.
technology that is built into the firmware of a mobile device
can provide an unbreakable connection between the device
and the organization�s computer network. “Many opportunities for

Even if a sophisticated attack attempts to subvert the cyber attack, such as

technology, the connection will survive, allowing IT to malware, lost or stolen
remotely invoke security commands such as remote data
retrieval or deletion, online or offline device freeze devices, phishing, disabling
capabilities. of encryption technology,
begin with human
Persistence technology can also provide the network�s
administrator with valuable insight into the result of a cyber negligence, not necessarily

attack, such as whether or not any sensitive data was security oversight.”
accessed.






CYBER DEFENSE MAGAZINE - ANNUAL EDITION 3
   44   45   46   47   48   49   50   51   52   53   54